We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
The aim of this paper is to address the problem of correctly dimensioning real-time embedded systems. It is well known that computers which control systems are greatly affected by...
Patrick Meumeu Yomsi, Yves Sorel, D. de Rauglaudre...
Variable-bandwidth servers (VBS) control process execution speed by allocating variable CPU bandwidth to processes. VBS enables temporal isolation of EDF-scheduled processes in th...
Silviu S. Craciunas, Christoph M. Kirsch, Ana Soko...
An ever increasing number of dynamic interactive applications are implemented on portable consumer electronics. Designers depend largely on operating systems to map these applicat...
Francesco Poletti, Paul Marchal, David Atienza, Lu...